Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.221.100.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51605
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;200.221.100.148.		IN	A

;; AUTHORITY SECTION:
.			415	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020061503 1800 900 604800 86400

;; Query time: 116 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 16 07:45:58 CST 2020
;; MSG SIZE  rcvd: 119
Host info
148.100.221.200.in-addr.arpa domain name pointer 200-221-100-148.speedy.speeduol.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.100.221.200.in-addr.arpa	name = 200-221-100-148.speedy.speeduol.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
46.101.164.27 attack
...
2020-09-10 15:36:52
91.103.248.23 attackspambots
Sep 10 06:47:18 localhost sshd[97434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.103.248.23  user=root
Sep 10 06:47:20 localhost sshd[97434]: Failed password for root from 91.103.248.23 port 41220 ssh2
Sep 10 06:51:15 localhost sshd[97884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.103.248.23  user=root
Sep 10 06:51:16 localhost sshd[97884]: Failed password for root from 91.103.248.23 port 44520 ssh2
Sep 10 06:55:13 localhost sshd[98335]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.103.248.23  user=root
Sep 10 06:55:15 localhost sshd[98335]: Failed password for root from 91.103.248.23 port 47818 ssh2
...
2020-09-10 15:41:11
168.196.132.212 attack
Brute force attempt
2020-09-10 15:35:19
45.132.227.46 attackbotsspam
Fail2Ban Ban Triggered
2020-09-10 15:32:53
161.35.236.158 attackbots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-10 15:28:41
104.244.78.136 attackspambots
Sep 10 06:55:14 localhost sshd[98339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.78.136  user=root
Sep 10 06:55:16 localhost sshd[98339]: Failed password for root from 104.244.78.136 port 40706 ssh2
Sep 10 06:55:17 localhost sshd[98351]: Invalid user admin from 104.244.78.136 port 45686
Sep 10 06:55:17 localhost sshd[98351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.244.78.136
Sep 10 06:55:17 localhost sshd[98351]: Invalid user admin from 104.244.78.136 port 45686
Sep 10 06:55:19 localhost sshd[98351]: Failed password for invalid user admin from 104.244.78.136 port 45686 ssh2
...
2020-09-10 15:29:46
85.239.35.130 attackspam
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-10T07:29:57Z
2020-09-10 15:31:18
139.64.132.109 attackbots
Brute forcing email accounts
2020-09-10 15:38:01
217.151.77.62 attackbotsspam
1599670363 - 09/09/2020 18:52:43 Host: 217.151.77.62/217.151.77.62 Port: 445 TCP Blocked
2020-09-10 15:45:31
51.75.28.25 attack
2020-09-10T12:20:20.241584hostname sshd[29496]: Failed password for root from 51.75.28.25 port 54456 ssh2
2020-09-10T12:24:00.895638hostname sshd[30500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=25.ip-51-75-28.eu  user=root
2020-09-10T12:24:03.289713hostname sshd[30500]: Failed password for root from 51.75.28.25 port 60902 ssh2
...
2020-09-10 15:19:43
131.117.150.106 attackspambots
...
2020-09-10 15:36:30
68.183.234.7 attackspam
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-09-10 15:28:23
217.229.25.241 attack
Chat Spam
2020-09-10 15:23:51
134.122.93.17 attackspam
reported through recidive - multiple failed attempts(SSH)
2020-09-10 15:08:27
222.94.229.59 attack
Icarus honeypot on github
2020-09-10 15:27:00

Recently Reported IPs

150.44.87.135 121.187.61.181 225.202.4.190 101.4.43.179
44.73.153.105 92.63.87.57 74.232.8.79 204.83.94.206
91.48.17.165 166.218.90.134 3.96.220.73 145.101.28.110
183.254.121.159 146.20.187.39 202.29.214.179 150.165.147.150
82.241.174.198 1.77.104.200 220.85.38.214 212.222.50.44